Steganography is a technique of concealing secret data within other quotidian files of the same or different types. Hiding data has been essential to digital information security. This work aims to design a stego method that can effectively hide a message inside the images of the video file. In this work, a video steganography model has been proposed through training a model to hiding video (or images) within another video using convolutional neural networks (CNN). By using a CNN in this approach, two main goals can be achieved for any steganographic methods which are, increasing security (hardness to observed and broken by used steganalysis program), this was achieved in this work as the weights and architecture are randomized. Thus, the exact way by which the network will hide the information is unable to be known to anyone who does not have the weights. The second goal is to increase hiding capacity, which has been achieved by using CNN as a strategy to make decisions to determine the best areas that are redundant and, as a result, gain more size to be hidden. Furthermore, In the proposed model, CNN is concurrently trained to generate the revealing and hiding processes, and it is designed to work as a pair mainly. This model has a good strategy for the patterns of images, which assists to make decisions to determine which is the parts of the cover image should be redundant, as well as more pixels are hidden there. The CNN implementation can be done by using Keras, along with tensor flow backend. In addition, random RGB images from the "ImageNet dataset" have been used for training the proposed model (About 45000 images of size (256x256)). The proposed model has been trained by CNN using random images taken from the database of ImageNet and can work on images taken from a wide range of sources. By saving space on an image by removing redundant areas, the quantity of hidden data can be raised (improve capacity). Since the weights and model architecture are randomized, the actual method in which the network will hide the data can't be known to anyone who does not have the weights. Furthermore, additional block-shuffling is incorporated as an encryption method to improved security; also, the image enhancement methods are used to improving the output quality. From results, the proposed method has achieved high-security level, high embedding capacity. In addition, the result approves that the system achieves good results in visibility and attacks, in which the proposed method successfully tricks observer and the steganalysis program.
In this study, the first kind Bessel function was used to solve Kepler equation for an elliptical orbiting satellite. It is a classical method that gives a direct solution for calculation of the eccentric anomaly. It was solved for one period from (M=0-360)° with an eccentricity of (e=0-1) and the number of terms from (N=1-10). Also, the error in the representation of the first kind Bessel function was calculated. The results indicated that for eccentricity of (0.1-0.4) and (N = 1-10), the values of eccentric anomaly gave a good result as compared with the exact solution. Besides, the obtained eccentric anomaly values were unaffected by increasing the number of terms (N = 6-10) for eccentricities (0.8 and 0.9). The Bessel
... Show MoreThe research problem has crystallized and in light of these capabilities, the level of performance depends on the application of modern training methods based on actual experimentation, and those methods aim to develop the components of achievement in this competition, including the quantities of exerting the distinctive strength with speed for the arms and feet, which reflects on good skillful performance because the skill of shooting by jumping forward and high forms A major role in achieving goals during the competition that qualifies the team to win, and through the follow-up of the researcher in the field and academic field, I noticed that there is a weakness in some physical abilities, which affects performance and skill level
... Show MoreThe aim of the research was to identify On the effect of the learning-by-play strategy on learning some handball skills among second-stage female students,Comparing the results of students' performance before and after implementing the learning by playing strategy,Providing development proposals for teaching handball skills in light of the research results.,I dependresearcherCurriculumexperimentalIn research procedures as an appropriate approach to achieving research objectives,For two groups, one experimental and the other control,Community of female studentsSecondFor the academic year 2024-2025, consisting of (4Female people (numbering)151) StudentChosen.Research sample30 female students from Section (B) were selected and (4) fe
... Show MoreWe studied the effect of certain environmental conditions for removing heavy metal elements from contaminated aqueous solutions (Cd, Cu, Pb, Fe, Zn, Ni, Cr) using the bacterium Bacillus subtilis to appoint the optimal conditions for removal ,The best optimum temperature range for two isolate was 30-35○C while the hydrogen number for the maximum mineral removal range was 6-7. The best primary mineral removal was 100 mg/L, while the maximum removal for all minerals was obtained after 6 hrs of Cu element time and the maximum removal efficiency was obtained after 24 hrs of Cu element. The results have proved that the best aeration for maximum removal was obtained at rotation speed of 150 rpm/minute. Inoculums of 5ml/100ml which contained 1
... Show MoreThe current research aims to highlight the role of social networking sites in the dissemination of scientific knowledge and the importance of their use by researchers, and the researcher relied on the descriptive approach and the survey method. Among the data collection tools are the questionnaire and paper and electronic sources. Among the most important results that the research came out with: The number of the subscribers’ sites was (14) sites, and the most used social sites for receiving and Disseminating Scientific knowledge are: Facebook, Telegram, WhatsApp, Viber, Messenger and YouTube. All respondents receive tacit knowledge (Exchange of Messages and News) through social networking sites, and few of them do not receive explicit kn
... Show MorePore pressure means the pressure of the fluid filling the pore space of formations. When pore pressure is higher than hydrostatic pressure, it is named abnormal pore pressure or overpressure. When abnormal pressure occurred leads to many severe problems such as well kick, blowout during the drilling, then, prediction of this pressure is crucially essential to reduce cost and to avoid drilling problems that happened during drilling when this pressure occurred. The purpose of this paper is the determination of pore pressure in all layers, including the three formations (Yamama, Suliay, and Gotnia) in a deep exploration oil well in West Qurna field specifically well no. WQ-15 in the south of Iraq. In this study, a new appro
... Show Moreالمستودع الرقمي العراقي. مركز المعلومات الرقمية التابع لمكتبة العتبة العباسية المقدسة